Description : A ……………… system in no more than idea. A) Conceptual B) Logical C) Physical D) None
Last Answer : A) Conceptual
Description : The data Flow Diagram is the basic component of …………… system A) Conceptual B) Logical C) Physical
Description : ………… system consists of programs, data files and documentation A) Conceptual B) Logical C) Physical D) None of the above
Last Answer : C) Physical
Description : A …………. System is no more than idea A) Conceptual B) Logical C) Physical D) All of the above
Description : The view of total database content is (A) Conceptual view. (B) Internal view. (C) External view. (D) Physical View.
Last Answer : (A) Conceptual view.
Description : Which of the following is a knowledge representation technique used to represent knowledge about stereotype situation? (A) Semantic network (B) Frames (C) Scripts (D) Conceptual Dependency
Last Answer : (C) Scripts
Description : Which of the following is a legal expression in SQL? (A) SELECT NULL FROM EMPLOYEE; (B) SELECT NAME FROM EMPLOYEE; (C) SELECT NAME FROM EMPLOYEE WHERE SALARY = NULL; (D) None of the above
Last Answer : B) SELECT NAME FROM EMPLOYEE;
Description : The employee information of an Organization is stored in the relation: Employee (name, sex, salary, deptname) Consider the following SQL query Select deptname from Employee Where sex = M' ... D) Average salary of male employees in a department is more than average salary of the organization.
Last Answer : (D) Average salary of male employees in a department is more than average salary of the organization.
Description : Consider the following relation: Works (emp_name, company_name, salary) Here, emp_name is primary key. Consider the following SQL query Select emp_name From Works T where salary>(select avg ( ... 4) Find all employees who earn more than the average salary of all employees of their company.
Last Answer : Find all employees who earn more than the average salary of all employees of their company.
Description : The four levels of Cloud Federation include a) Conceptual level, Logical level, Operational level, Infrastructural level b) Conceptual level, Service level, Operational level, Infrastructural ... level, Infrastructural level d) Security level, Logical level, Operational level, Infrastructural leve
Last Answer : Conceptual level, Logical level, Operational level, Infrastructural level
Description : .The __________ addresses the technical challenges involved in enabling heterogeneous cloud computing systems to interoperate seamlessly a) Logical and Operational Level b) Infrastructure Level c) None of the above d) Conceptual Level
Last Answer : Infrastructure Level
Description : According to Robert Katz, when managers have the mental ability to analyze and diagnose complex situations, they possess _____________ skills. (a) Technical ; (b) Leadership ; (c) Problem-solving ; (d) Conceptual
Last Answer : ; (d) Conceptual
Description : The conceptual model is (A) dependent on hardware. (B) dependent on software. (C) dependent on both hardware and software . (D) independent of both hardware and software.
Last Answer : (D) independent of both hardware and software.
Description : Find the false statement: (A) The relationship construct known as the weak relationship type was defined by Dey, Storey & Barron (1999). (B) A weak relationship occurs when two ... Ternary, Quaternary and Quintary relationships are shown through a series of application scenario's and vignette's
Last Answer : (C) Conceptual model is not accurate representation of "Universe of interest".
Description : In Data mining, .............. is a method of incremental conceptual clustering. (A) STRING (B) COBWEB (C) CORBA (D) OLAD
Last Answer : (B) COBWEB
Description : The different types of tables maintained by the operating system are ............. A) memory, logical , I/O file B) memory, I/O, file, physical C) memory, I/O, file, process D) memory, logical, I/O, physical
Last Answer : C) memory, I/O, file, process
Description : DML is provided for (A) Description of logical structure of database. (B) Addition of new structures in the database system. (C) Manipulation & processing of database. (D) Definition of physical structure of database system.
Last Answer : C) Manipulation & processing of database.
Description : Which of the following addresses is used to deliver a message to the correct application program running on a host? (A) Port (B) IP (C) Logical (D) Physical
Last Answer : (A) Port
Description : A memory management system has 64 pages with 512 bytes page size. Physical memory consists of 32 page frames. Number of bits required in logical and physical address are respectively: (1) 14 and 15 (2) 14 and 29 (3) 15 and 14 (4) 16 and 32
Last Answer : (3) 15 and 14
Description : Ms. Shalini has just created a table named “Employee” containing columns Ename, Department, Salary. -Technology
Last Answer : SQL command to add a primary key column:Alter table employee add empid int primary key;Importance of Primary key in a table:Primary key column is used to uniquely identify each record of the table. A column defined as primary key cannot have a duplicate entry and can't be left blank.
Description : What is the most appropriate function of Memory Management Unit (MMU) ? (A) It is an associative memory to store TLB (B) It is a technique of supporting multiprogramming by creating dynamic partitions ... to physical address (D) It is an algorithm to allocate and deallocate main memory to a process
Last Answer : (C) It is a chip to map virtual address to physical address
Description : In comparing management fraud with employee fraud, the auditor's risk of failing to discover the fraud is a. Greater for employee fraud because of the larger number of employees in ... existing internal controls. d. Greater for management fraud because managers are inherently smarter than employees.
Last Answer : Greater for management fraud because of management's ability to override existing internal controls
Description : In comparing management fraud with employee fraud, the auditor's risk of failing to discover the fraud is a. Greater for employee fraud because of the larger number of employees in the ... blue collar workers. d. Greater for management fraud because managers are inherently smarter than employees
Description : Which of the following is/are the sources for project requests? A) Request from Department managers B) Request from senior executives C) Request from system Analyst D) All of the above
Last Answer : D) All of the above
Description : …………… is a way to bind the data and its associated functions together which allows the data and functions to be hidden. A) Structure B) Class C) Enum D) Both A and B
Last Answer : B) Class
Description : The sender is a router thathas receiveda datagram destinedfor a host on thesame network. The logical address that mustbe mapped to a physical address is ______. A) thedestination IP address in the datagram ... IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : thedestination IP address in the datagram header
Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : the IP address of therouter found inthe routing table
Description : f the sender is a host and wants tosend a packet toanotherhost on the samenetwork, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : hedestination IP address in the datagram header
Description : What error will be generated if a space is given between the logical AND operator (&&)? Will it be a compile-time or a run-time error?
Last Answer : Example: if(5>2 & & 6
Description : State true or false. i) comparisons precede logical operations in java ii) assignment operations succeed increment operations iii) arithmetic operations succeed comparisons iv) x precede + A) i-true, ii-true, iii-false, ... false, ii-true, iii-false, iv-false D) i-true, ii-false, iii-false, iv-true
Last Answer : A) i-true, ii-true, iii-false, iv-true
Description : .................. is a facility that allows programmers to address memory from a logical point of view, without regard to the main memory, physically available. A) Visual memory B) Real memory C) Virtual memory D) Secondary memory
Last Answer : C) Virtual memory
Description : Which of the following is not a logical database structure? A) Chain B) Network C) Tree D) Relational
Last Answer : A) Chain
Description : A logical schema A) is the entire database B) is a standard way of organizing information into accessible parts. C) Describes how data is actually stored on disk. D) All of the above
Last Answer : B) is a standard way of organizing information into accessible parts.
Description : Which of the following is the logical topology? A) Bus B) Tree C) Star D) Both A and B
Last Answer : C) Star
Description : "lf my computations are correct and I pay the electric bill, then I will run out of money. If I don't pay the electric bill, the power will be turned off. Therefore, if I don't run out of money and the power is still on ... r and ¬p → ¬b, then (¬r∨p)→¬c (D) if (c∨b) → r and ¬b → ¬p, then (¬r∧p)→¬c
Last Answer : (A) if (c∧b) → r and ¬b → ¬p, then (¬r∧p)→¬c
Description : Which of the following statements is true? (1) The sentence S is a logical consequence of S1,..., Sn if and only if S1˄S2˄........˄Sn→S is satisfiable. (2) The sentence S is a logical consequence of ... S is a logical consequence of S1,..., Sn if and only if S1˄S2˄........˄Sn˄S is inconsistent.
Last Answer : The sentence S is a logical consequence of S1,..., Sn if and only if S1˄S2˄........˄Sn→S is valid.
Description : Payment made by an employer to employee monthly, other than salary is called …………. A) Bonus B) Allowances C) Benefits D) None of these
Last Answer : B) Allowances
Description : Consider a subnet with 720 routers. If a three-level hierarchy is choosen with eight clusters, each containing 9 regions of 10 routers, then total number of entries in the routing table is ................... (A) 25 (B) 27 (C) 53 (D) 72
Last Answer : Answer: A Explanation: Each router needs 10 entries for local routers, 8 entries for routing to other regions within its own cluster, and 7 entries for distant clusters, for a total of 25 entries.
Description : If you are a salary employee, after working 67 hours in one week should you not be paid overtime?
Last Answer : property taxes are fully deductible from your income so you should be able to look on your pay stub. But the address was not a valid address so there was no way to look it up but a website you could use to look up your property taxes is http://www.city-data.com/city/Brooklyn-New-York.html
Description : In a system designed to work out the tax to be paid:An employee has £4000 of salary tax free. The next £1500 is taxed at 10% the next £28000 is taxed at 22%. Any further amount is taxed at 40% ... ) £4800; £14000; £28000 b) £5200; £5500; £28000 c) £28001; £32000; £35000 d) £5800; £28000; £32000
Last Answer : d) £5800; £28000; £32000
Description : In a system designed to work out the tax to be paid: An employee has £4000 of salary tax free. The next £1500 is taxed at 10%. The next £28000 after that is taxed at 22%. Any further amount is taxed ... of these is a valid Boundary Value Analysis test case? A. £28000. B. £33501. C. £32001. D. £1500
Last Answer : B. £33501.
Description : Write a program to input name and salary of employee and throw user defined exception if entered salary is negative.
Last Answer : import java.io.*; class NegativeSalaryException extends Exception { public NegativeSalaryException (String str) { super(str); } } public class S1 { public static void main(String[] args) ... catch (NegativeSalaryException a) { System.out.println(a); } } }
Description : Write a program to implement the concept of virtual base class for following figure. Accept and display information of one employee with his name, code, basic pay, experience and gross salary with the object of employee class.
Last Answer : #include<iostream.h> #include<conio.h> class Master { char name[10],code[3]; public: void acceptM() { cout<<"\nEnter name and code "; cin>>name>>code; ... .displayM(); e.displayA(); e.displayD(); e.displayE(); getch(); }
Description : A software project was estimated at 352 Function Points (FP). A four person team will be assigned to this project consisting of an architect, two programmers, and a tester. The salary of the architect is Rs.80,000 per month, the ... ) Rs.28,16,000 (2) Rs.20,90,000 (3) Rs.26,95,000 (4) Rs.27,50,000
Last Answer : (4) Rs.27,50,000
Description : ………………….. is responsible for converting the higher level protocol addresses (IP addresses) to physical network addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)
Last Answer : A) Address Resolution Protocol (ARP)
Description : ........ is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)
Last Answer : D) Internet Control Message Protocol (ICMP)
Description : Which conflict resolution technique do project managers use most often? A. Smoothing B. Norming C. Confronting D. Forcing
Last Answer : C. Confronting
Description : Two mutually exclusive projects are being considered. Neither project will be repeated again in the future after their current lives are complete. There exists a potential problem though -- ... NPV technique and simply choose the highest IRR since managers are concerned about maximizing returns.
Last Answer : A. Rely on the NPV method and make your choice as it will tell you which one is best.
Description : What network model enables engineer managers to schedule, monitor and control large and complex projects by employing three time estimates per activity a. Forecasting b. Program evaluation review technique c. Critical path method d. simulation
Last Answer : b. Program evaluation review technique
Description : What network model enables engineer managers to schedule, monitor and control large and complex projects by using only one time factor per activity a. Forecasting b. Program evaluation review technique c. Critical path method d. simulation